Show simple item record

dc.contributor.authorMavronicolas, Mariosen
dc.contributor.authorLesta, Vicky Papadopoulouen
dc.contributor.authorPhilippou, Annaen
dc.contributor.authorSpirakis, Paul G.en
dc.creatorMavronicolas, Mariosen
dc.creatorLesta, Vicky Papadopoulouen
dc.creatorPhilippou, Annaen
dc.creatorSpirakis, Paul G.en
dc.date.accessioned2019-11-13T10:41:12Z
dc.date.available2019-11-13T10:41:12Z
dc.date.issued2005
dc.identifier.issn0302-9743
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/54495
dc.description.abstractConsider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. We model this practical network scenario as a non-cooperative multi-player game on a graph, with two kinds of players, a set of attackers and a protector player, representing the viruses and the system security software, respectively. Each attacker player chooses a node of the graph (or a set of them, via a probability distribution) to infect. The protector player chooses independently, in a basic case of the problem, a simple path or an edge of the graph (or a set of them, via a probability distribution) and cleans this part of the network from attackers. Each attacker wishes to maximize the probability of escaping its cleaning by the protector. In contrast, the protector aims at maximizing the expected number of cleaned attackers. We call the two games obtained from the two basic cases considered, as the Path and the Edge model, respectively. We are interested in the associated Nash equilibria on them, where no network entity can unilaterally improve its local objective. We obtain the following results: - The problem of existence of a pure Nash equilibrium is script N sign P-complete for the Path model. This opposed to that, no instance of the Edge model possesses a pure Nash equilibrium, proved in [4]. - We compute, in polynomial time, mixed Nash equilibria on corresponding graph instances. These graph families include, regular graphs, graphs that can be decomposed, in polynomially time, into vertex disjoint r-regular subgraphs, graphs with perfect matchings and trees. - We utilize the notion of social cost [3] for measuring system performance on such scenarioen
dc.description.abstracthere is defined to be the utility of the protector. We prove that the corresponding Price of Anarchy in any mixed Nash equilibria of the game is upper and lower bounded by a linear function of the number of vertices of the graph. © Springer-Verlag Berlin Heidelberg 2005.en
dc.source1st International Workshop on Internet and Network Economics, WINE 2005en
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-33744942352&doi=10.1007%2f11600930_98&partnerID=40&md5=a1266b51c27bb7f26cf9625327630811
dc.subjectComputer softwareen
dc.subjectProblem solvingen
dc.subjectComputer networksen
dc.subjectGraph theoryen
dc.subjectProbability density functionen
dc.subjectNetwork securityen
dc.subjectComputer virusesen
dc.subjectLinear functionsen
dc.subjectSecurity of dataen
dc.subjectSecurity systemsen
dc.subjectEdge model possessesen
dc.subjectSystem security softwareen
dc.titleA graph-theoretic network security gameen
dc.typeinfo:eu-repo/semantics/article
dc.identifier.doi10.1007/11600930_98
dc.description.volume3828 LNCSen
dc.description.startingpage969
dc.description.endingpage978
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeArticleen
dc.description.notes<p>Conference code: 67467en
dc.description.notesCited By :14</p>en
dc.source.abbreviationLect. Notes Comput. Sci.en
dc.contributor.orcidSpirakis, Paul G. [0000-0001-5396-3749]
dc.contributor.orcidLesta, Vicky Papadopoulou [0000-0003-2920-8473]
dc.gnosis.orcid0000-0001-5396-3749
dc.gnosis.orcid0000-0003-2920-8473


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record